Cloud Computing Crime

Cloud computing crime is the primary message in this image featuring a shadowy mask-wearing figure peering out from behind a vault door situated in a stormy cloud cover. There is no mistaking the sinister nature of the criminal breaking through a vault door in this cloud scape that represents cloud computing, Internet networking, and wireless communications.

Communications Technology And Security

As future communications technology becomes ever more prevalent and utilized the need for security becomes ever more pressing. This image is one that can be used to publicize, advertise and editorialize about issues around online security. Whether the threat is to wireless communications, streaming data, or wide area networks, the importance of creating adequate firewalls and other protections cannot be minimized.

Creating Concept Images Of Cloud Computing Dangers

Cloud computing is not without its dangers, and this image was created to help deal with all aspects of online security threats. The raw materials I used to create this image includes numerous cloud photos, some shot from the ground and some captured from the window of a commercial jetliner. I photographed myself at the cyber criminal wearing a ski mask. The vault door was actually the door of a bank vault I photographed a couple of decades ago for an annual report. I used Photoshop to composite the images into this cloud computing threat image.

A Hacker In The Cloud

A hacker in the cloud is illustrated with this photo. Whether the sinister figure is an intellectual property thief, engaged in corporate espionage, or attempting cyber warfare, there is no mistaking the threat. The open vault door clearly indicates a breach in security, a backdoor into the network, or flaws in the encryption procedures. Whether the threat is in the form of computer worms, computer viruses or bugs, it can be illustrated by this hacker image.